Microsoft pursuing Sasser author

Microsoft is working with law enforcement to find the author of the Sasser worm, which first appeared on Friday and targets machines running the company's Windows operating system.

Microsoft is working closely with authorities, including the Northwest CyberCrime Taskforce to analyze Sasser's code and "identify those responsible for this malicious activity," the company said. The investigation is ongoing, Microsoft said.

Sasser appeared on Friday and exploits a recently disclosed hole in a component of Windows called the Local Security Authority Subsystem Service, or LSASS. Microsoft released a software patch, MS04-011, on April 13 that plugs the LSASS hole. (See: www.microsoft.com./technet/security/bulletin/ms04-011.mspx.)

Customers have downloaded more than 150 million copies of that patch since then, said Michael Reavey, security program manager with Microsoft's Security Response Center. Overall, patch downloads have quadrupled since the company first introduced its new Protect Your PC campaign in 2003.

Sasser is similar to an earlier worm, Blaster, because users do not need to receive an e-mail message or open a file to be infected. Instead, just having a vulnerable Windows machine connected to the Internet with communications port number 445 is enough to get infected.

Microsoft issued a statement on Sunday saying that it is working with the Taskforce to analyze malicious code in Sasser and in a Trojan program called Agobot, which was also modified to take advantage of the LSASS vulnerability.

The task force is a joint effort of the U.S. Federal Bureau of Investigation (FBI), the U.S. Secret Service and local law enforcement in Washington state, where Microsoft is based in Redmond.

Computer virus experts have noted similarities between computer code in the Sasser worm and a common family of e-mail worms called "Netsky."

Reavey could not provide details about those links or about the ongoing investigation into the Sasser author on Monday.

"All I can say is that once we find him, we're going to make sure he's prosecuted," Reavey said.

Microsoft referred questions about the investigation to the task force. Calls to the FBI, the Secret Service and the Seattle police were not immediately returned.

The company also announced other steps it is taking to lessen the damage caused by Sasser, estimated to have infected hundreds of thousands of Windows XP and Windows 2000 machines on the Internet.

Microsoft released a free software program to clean Windows systems infected with Sasser. (See: http://www.microsoft.com/security/incident/sasser.asp.). The company also published information on how to configure firewalls to stop the worm's spread and encouraged customers to enable their personal firewalls and install the Microsoft Windows patch that fixes the vulnerability Sasser exploits.

The company will continue to update the tool to work with new variants of the Sasser worm, Reavey said.

Besides working with law enforcement, Microsoft also offers bounties for information leading to the arrest of those responsible for major viruses and worms. In November, the company announced it was allocating US$5 million to a reward fund for the arrest of virus authors. In January, the company said that it was offering a $250,000 reward for information leading to the arrest and conviction of the author of the MyDoom.B worm.

Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.

Copyright 2018 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.